QUESTION 465An administrator is unable to connect to servers in the DMZ. Which of the following commands should the administrator run to determine where the connection failure occurs?

A. nslookupB. tracerouteC. telnetD. netstat

Answer: B

QUESTION 466Which of the following is used in Object-Based Storage to reference the servers that provide services to store, retrieve, and manage data in the Object-Based Storage system?

A. ControllerB. HostC. NodeD. Switch

Answer: C

QUESTION 467When the cache receives write data from the hosts, which of the following does the controller send back to the host?

A. RequestB. HeaderC. FooterD. Acknowledgement

Answer: D

QUESTION 468Which of the following describes a community string?

A. It is used to group devices that use SMTP.B. It is used to group devices that are clustered.C. It is used to group devices that manage SaaS.D. It is used to group devices that are managed by SNMP.

Answer: D

QUESTION 469Which of the following network optimization techniques would be MOST appropriate for more efficient delivery of frequently accessed websites?

A. Implementing load balancingB. Installing a caching serverC. Placing devices on the same subnetD. Implementing compression on the web server

Answer: B

QUESTION 470An administrator has been asked to remotely configure a guest machine while on vacation. The administrator only has access to a hotel kiosk to make the necessary changes. Which of the following can be used to securely meet this request?

A. SCPB. HTTPSC. FTPD. IPMI

Answer: B

QUESTION 471A number of VMs in a host are experiencing processor contention, slowing down operations. Which of the following host hardware upgrade paths would yield higher VM performance, for the same VMs in the given hypervisor host?

QUESTION 472A company has just completed a security audit and received initial results from the auditor. The results show that the ethical hacker was able to gain access to the company servers by exploiting non-hardened VMs and hosts as guests and administrators. Which of the following should be implemented to harden the environment? (Select two.)

QUESTION 473An administrator needs to verify what ports are listening on an operating system. Which of the following tools can be used to accomplish this task?

A. telnetB. netstatC. packet snifferD. ifconfig

Answer: B

QUESTION 474A company has decided to replace hypervisors to reduce licensing costs. An administrator has been tasked with migrating VMs to the new hypervisor. Which of the following migration types will be used?